You are previewing CCNP BCMSN Quick Reference Sheets: Exam 642-812.
O'Reilly logo
CCNP BCMSN Quick Reference Sheets: Exam 642-812

Book Description

CCNP Quick Reference Sheets Bundle (Digital Short Cut)

Brent Stewart, Denise Donohue, Jay Swan

ISBN: 1-58705-327-6

As a final exam preparation tool, the four CCNP Quick Reference Sheets included in this value-priced bundle provide a concise review of all objectives on all four of the new CCNP exams (BSCI 642-901, BCMSN 642-812, ISCW 642-825, and ONT 642-845). These digital Short Cuts provide you with detailed, graphical-based information, highlighting only the key topics in cram-style format.

With these documents as your guide, you will review key concepts required to manage the routers and switches that form the network core, as well as edge applications that integrate voice, wireless, and security into the network. These fact-filled Quick Reference Sheets allow you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts.

Table of Contents:

1.      CCNP BSCI Quick Reference Sheets

2.      CCNP BCMSN Quick Reference Sheets

3.      CCNP ONT Quick Reference Sheets

4.      CCNP ISCW Quick Reference Sheets

Brent Stewart, CCNP, CCDP, MCSE, is a network administrator for CommScope and a certified Cisco Systems instructor. He participated in the development of BSCI and has seperately developed trainingmaterial for ICND, BSCI, BCMSN, BCRAN, and CIT. Brent lives in Hickory, NC, with his wife, Karen and children, Benjamin, Kaitlyn, Madelyn, and William.

Denise Donohue, CCIE No. 9566, is manager of solutions engineering for ePlus Technology in Maryland. She is responsible for designing and implementing data and VoIP networks, supporting companies based in the National Capital region. Prior to this role, she was a systems engineer for the data consulting arm of SBC/AT&T. Denise was a Cisco instructor and course director for Global Knowledge and did network consulting for many years. Her CCIE is in Routing and Switching.  

Jay Swan is a senior network engineer for the Southern Ute Indian Tribe Growth Fund in Ignacio, CO. Prior to this position, he was a Cisco instructor and course director for Global Knowledge. Jay has also worked in IT in the higher education and service provider fields. He holds CCNP® and CCSP® certifications.

Table of Contents

  1. Copyright
  2. About the Authors
  3. About the Technical Reviewers
  4. Icons Used in This Book
  5. 1. The Evolving Network Model
    1. The Hierarchical Design Model
    2. Problems with the Hierarchical Design Model
    3. Enterprise Composite Network Model
    4. SONA and IIN
  6. 2. VLAN Implementation
    1. What Is a VLAN?
    2. Best Practices
    3. Creating a VLAN in Global Config Mode
    4. Creating a VLAN in Database Mode
    5. Assigning Ports to VLANs
    6. Verifying VLAN Configuration
    7. Troubleshooting VLAN Issues
    8. VLAN Trunking
    9. Configuring a Trunk Link
    10. Native VLAN with 802.1Q
    11. VLAN Mapping
    12. VLANs Allowed on the Trunk
    13. Verifying a Trunk Link
    14. 802.1Q Tunnels
    15. Layer 2 Protocol Tunneling (GBPT)
    16. Troubleshooting Trunking
    17. VLAN Trunking Protocol (VTP)
    18. VTP Switch Roles
    19. VTP Pruning
    20. Configuring VTP
    21. Verifying and Monitoring VTP
    22. Troubleshooting VTP
    23. Adding a New Switch to a VTP Domain
  7. 3. Spanning Tree
    1. Understanding the Spanning Tree Protocol
    2. Spanning Tree Election Criteria
    3. The STP Election
      1. Root Bridge Election
      2. Root Port Election
    4. Designated Port Election
    5. Bridge Protocol Data Units (BPDUs)
    6. BPDU Fields
    7. Spanning Tree Port States
    8. Designing for Spanning Tree
    9. Spanning Tree and PVST
    10. Configuring Spanning Tree
    11. Spanning Tree Enhancements
    12. Portfast
    13. UplinkFast
    14. BackboneFast
    15. Rapid Spanning Tree (RSTP)
    16. RSTP Port Roles
    17. BPDU Differences in RSTP
    18. RSTP Fast Convergence
    19. Multiple Spanning Tree (MST)
    20. EtherChannels
    21. Configuring an EtherChannel
    22. Verifying an EtherChannel
    23. Additional Spanning Tree Features
    24. BPDU Guard
    25. BPDU Filtering
    26. Root Guard
    27. Unidirectional Link Detection (UDLD)
    28. Loop Guard
    29. Troubleshooting STP
    30. Identifying a Bridging Loop
    31. What to Use Where
  8. 4. InterVLAN Routing
    1. InterVLAN Routing Using Multilayer Switches
    2. InterVLAN Routing
    3. Multilayer Switching
      1. Understanding the Switching Process
      2. Understanding the Switching Table
      3. Understanding Switch Forwarding Architectures
    4. Multilayer Switching
      1. ARP Throttling
      2. Configuring and Troubleshooting CEF
  9. 5. Layer 3 Redundancy
    1. Hot Standby Router Protocol (HSRP)
      1. HSRP States
      2. Configuring HSRP
    2. Virtual Router Redundancy Protocol (VRRP)
    3. GLBP
  10. 6. Using Wireless LANs
    1. Wireless LAN Overview
      1. Characteristics of Wireless LANs
      2. WLAN Topologies
    2. WLAN Standards
      1. 802.11b Standard
      2. 802.11a Standard
      3. 802.11g Standard
    3. Wireless Security
      1. WPA/WPA2 Authentication
    4. Cisco Wireless Network Components
      1. Cisco Unified Wireless Network
      2. Autonomous APs
      3. Lightweight Access Points
      4. Wireless LAN Antennas
        1. Gain
        2. Directionality
        3. Multipath Distortion
        4. EIRP
      5. Power over Ethernet (PoE) Switches
    5. Configuring Wireless LAN Devices
      1. Configuring Autonomous Access Points
      2. Configuring a WLAN Controller
  11. 7. VoIP in a Campus Network
    1. Preparing the Network for VoIP
      1. Network and Bandwidth Considerations
      2. Auxiliary (or Voice) VLANs
    2. QoS for VoIP
      1. QoS Actions
      2. DSCP Values
      3. Trust Boundaries
    3. Configuring VoIP Support on a Switch
      1. Manual Configuration
      2. Using AutoQoS
  12. 8. Campus Network Security
    1. MAC Address Flooding
      1. Port Security
      2. Port-Based Authentication
    2. VLAN-Based Attacks
      1. Switch Spoofing
      2. 802.1Q Double-Tagging
      3. VACLs
      4. Private VLANs
    3. Spoof Attacks
      1. DHCP Spoofing
      2. ARP Spoofing
    4. Securing Spanning Tree
      1. BPDU Guard
      2. BPDU Filtering
      3. Root Guard
    5. Prevent Spanning Tree Loops
      1. Unidirectional Link Detection (UDLD)
      2. Loop Guard
    6. Securing Your Switch